Masterarbeit, 2013
66 Seiten, Note: 8.12
1. Introduction
1.1 Network Components of WSN
1.1.1 Sensor Node and its Functional Units
1.1.2 Base Station (Sink)
1.2 Sensor Network Requirements
1.3 WSN Operation
1.3.1 Communication Model
1.4 Performance limits of WSN
1.5 Classification of Sensors
1.5.1 Active Sensors
1.5.2 Passive, Directional Sensors
1.5.3 Narrow Beam Sensors (Passive)
1.6 Classification of Sensor Network Applications
1.6.1 Event Detection and Reporting
1.6.2 Data Gathering and Periodic Reporting
1.6.3 Sink-Initiated Querying
1.6.4 Tracking Based Application
1.7 Motivation of the Work
1.8 Thesis Outline
2. Literature Survey & Problem Statement
2.1 Existing Security Protocols
2.1.1 Secure Information Aggregation: SIA [25]
2.1.2 On Scalable security model
2.1.3 MAC Protocol
2.1.4 TinySec
2.1.5 Localized Encryption and Authentication Protocol (LEAP)
2.1.6 Neighborhood based Key Agreement Protocol (NEKAP)
2.1.7 MiniSec
2.1.8 Secure Data Aggregation Protocol (SDAP)
2.1.9 SPINS
2.1.10 Key predistribution schemes
2.1.11 Dynamic cryptographic algorithm [44]
2.1.12 Hierarchical key management
2.2 Conclusion of literature survey
2.3 Problem Statement
2.4 Objectives
3. Security in WSN
3.1 Security Issues in Wireless Sensor Networks
3.2 Why Sensor Networks Are Difficult to Protect
3.3 Security Challenges and Design Issues in WSN
3.3.1 Node Deployment
3.3.2 Transmission Media
3.3.3 Connectivity
3.3.4 Coverage
3.3.5 Fault tolerance
3.3.6 Scalability
3.3.7 Data Aggregation
3.3.8 Quality of Service
3.4 Security Considerations
3.4.1 Confidentiality
3.4.2 Integrity
3.4.3 Authentication
3.4.4 Availability
3.5 Security Classes
3.6 Attacks on Sensor Networks
3.6.1 Passive Attacks
3.6.1.1 Attacks against Privacy
3.6.2 Active Attacks
3.6.2.1 Routing Attacks in Sensor Networks
3.6.2.2 Denial of Service
3.6.2.3 Node Replication Attacks
3.7 Security Objectives
3.7.1 Insecure Delivery
3.7.2 Secure Delivery
3.7.3 Network Life Time
4. Proposed Method
4.1 Concept
4.2 Assumptions
4.3 Application Scenario
4.4 Algorithm for encrypting the sensed data
4.5 Time period calculation
4.6 Energy consumption calculation
5. Simulation and Results
5.1 Analysis Activity
5.2 Simulation
5.3 Simulation Setup
5.4 Results and comparisons with existing methods
5.4.1 Energy consumption per encryption
5.4.2 Energy consumption per decryption
5.4.3 Total Energy Vs Number of continuous transmissions at source node
5.4.4 Total Energy Vs Number of continuous transreceptions at intermediate node
5.4.5 Total Energy Vs Lifetime
5.4. Space complexity of algorithms
5.5 Discussion
6. Conclusion & Future Scope
6.1 Conclusion
6.2 Future Scope
The research primarily aims to identify the security and performance challenges within wireless sensor networks (WSNs) and to propose a novel, energy-efficient security algorithm that prolongs network lifetime while maintaining robust security against common cryptanalytic attacks. The study focuses on balancing the trade-off between cryptographic security and the resource-constrained nature of sensor nodes.
1.1 Network Components of WSN
The main components of a general WSN are the sensor nodes, the sink (base station) and the events being monitored.
1.1.1 Sensor Node and its Functional Units
In WSN, every sensor node has capabilities of sensing, processing and communicating data to the required destination. The basic entities in sensor nodes are sensing unit, power unit, processing unit, communication unit and memory unit to perform these operations shown in Figure 1.2 below.
i) Sensing Unit
Sensors play an important role in sensor networks by creating a connection between physical world and computation world. Sensor is a hardware device used to measure the change in physical condition of an area of interest and produce response to that change. Sensors sense the environment, collect data and convert it to fundamental data (current or voltage etc) before sending it for further processing. It converts the analogue data (sensed data from an environment) to digital data and then sends it to the microcontroller for further processing. There are different categories of sensors which are available and can be used depending on the nature of the intended operation.
1. Introduction: Provides an overview of wireless sensor network technology, its core components, operating models, classification, and the motivation for developing new security protocols.
2. Literature Survey & Problem Statement: Reviews existing security protocols for WSNs, identifies their limitations regarding energy consumption and security, and defines the research objectives.
3. Security in WSN: Analyzes the unique security requirements, threats, and design challenges specifically related to wireless sensor networks in hostile environments.
4. Proposed Method: Details the conceptual design and implementation of a new energy-efficient, dynamic-key based security algorithm intended to safeguard sensor data.
5. Simulation and Results: Presents the platform, methodology, and performance outcomes of the proposed algorithm compared to existing models, focusing on energy metrics and lifetime.
6. Conclusion & Future Scope: Summarizes the research findings regarding efficiency and security improvements and proposes directions for future enhancements in cryptographic techniques.
Wireless Sensor Networks, WSN, Security Protocol, Energy Efficiency, Data Aggregation, Dynamic Key, Network Lifetime, Cryptography, Node Authentication, DoS Attack, Symmetric Encryption, Resource-constrained, Sensor Nodes, Simulation, Performance Metrics
The research focuses on addressing the trade-off between energy consumption and security in wireless sensor networks by developing a novel, energy-efficient security algorithm.
The core themes include the design of secure, low-overhead cryptographic algorithms for WSNs, energy optimization, performance analysis through simulation, and mitigating security threats such as node tampering and routing attacks.
The research aims to determine how to implement a secure encryption mechanism for resource-constrained WSNs that minimizes energy expenditure and maximizes the operational lifetime of sensor nodes.
The author uses a comparative methodology: implementing an existing security protocol and a new proposed protocol, then running simulations to analyze performance metrics like energy consumption, memory requirements, and network lifetime.
The main sections cover a literature review of current security protocols, an analysis of WSN-specific security issues, the technical design of the proposed method, and detailed simulation results evaluating the algorithm's performance.
Key terms include Wireless Sensor Networks (WSN), energy efficiency, security protocol, network lifetime, and dynamic encryption.
The security is maintained not through complex computation, but through the periodic changing of the encryption key, which makes it cryptographically robust against brute-force attacks.
Traditional security mechanisms (like IPSec or SSL) are designed for environments with sufficient power and memory, whereas WSNs are resource-constrained and have unique operational requirements that make these protocols impractical.
It refers to the negligible time period during which the data is decrypted and re-encrypted with a new key, ensuring that information remains secure even during the transition of encryption keys.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

